Published

A secret facility that creates serious spy gadgets for the government.

Most unusual circumstances.

An ousted televangelist is publicly accused by his successors of eavesdropping on them. The truth, they were eavesdropping on him.

Most unusual and successful counterespionage assignments.

We caught a group of foreign nationals actively engaged in a spy mission in our client's headquarters. Our client was a Fortune 100 company. They had been diligent over the years in conducting proactive inspections. This day it paid off.

What else should I know about Murray Associates?

Scary is not professional. We don't have spy vans, mirrored sunglasses or hokey doctor smocks. We arrive at your location as simply ordinary visitors with a few plain cases.

As invited guests to your premises, we always act accordingly. Low key in demeanor, dressed to blend in. We do not disrupt the normal flow of business, or appear out of place after-hours.

We work at your convenience. This means evenings, weekends and even most holidays... at no extra charge.

You can trust our estimates. No nebulous guesses. No surprises.

Our findings can be entered as evidence in legal proceedings. We will also act as your expert witness.

The Secret to Successful Corporate Counterespionage

Look for the major warning sign - electronic surveillance.

Intelligence collection is a leisurely process. Your conversations and information are collected – in many ways – long before they are used against you. Until this intelligence is used, no harm is done.

During the intelligence collection stage you still have time to protect yourself... if, you look for the warning signs:

We will make cost-effective recommendations to make your organization a less attractive target.

Vigilance

Periodic re-inspections: assure new attempts at electronic surveillance are caught quickly, before harm is done; new loopholes are discovered before advantage is taken of them; security measures in place are tested to assure continued effectiveness.

In between inspections, we are here as your security counselor.

Can I add TSCM protection without increasing my security budget?

Sure. The money is probably there; it's just mis-allocated.

Many security budgets are lopsided. They morph out of shape over time. Common causes include pressure to protect the easily seen physical assets, and over-spending on IT security.

You want to avoid a situation where 80% of your budget protects only 20% of your assets. Keep in mind, intellectual assets are far more valuable than physical assets. Evaluate what makes your organization valuable. Then adjust.

No one really knows. Eavesdropping, wiretapping, snooping, voyeurism, and espionage are covert activities. When done correctly, there is no awareness.

We do know that these activities take place. Stories about spying appear every week in the news media. But, consider this... These stories are actually the spying failures! The successes escape notice.

Even though no one really knows how much bugging is going on, we can logically say, "What we know is just the tip of the iceberg."

What does a spy look like?

While there is no exact answer, a composite picture was developed by the Business Espionage Controls and Countermeasures Association...

Our refined search protocol is used to discover these emissions. We comb the radio-frequency spectrum with custom designed, government-level surveillance receivers, and process these signals in real-time. Final result... even the most sophisticated audio / data / video bugs are revealed.

This level of testing is extremely effective, but very rare outside official circles. This is due to high cost of the instrumentation and the technical skills required to use it. (Case History)

Portable Radio-Reconnaissance Spectrum Analysis™

We are ready for the demands of travel with several portable spectrum analyzers as well.

NLJD – Non-Linear Junction Detection

This TSCM instrument locates spycams and other bugging devices even when they are on standby, turned off or out of battery power.

This detection technique is non-destructive. It can see into and through solid objects, and eliminates the intrusiveness associated with old-school physical searches.

Bonus... less chance for breakage.

Thermal Emissions Spectrum Analysis™ (TESA™)

Minute amounts of heat are generated as electricity moves through a surveillance device's circuitry.

Using this advanced technology allows us to find surveillance cameras hidden in false ceilings and walls and bugs hidden in antique furniture - without damaging these items during the inspection process.

Digital Surveillance Location Analysis™

Some devices are difficult to impossible to locate without the proper instrumentation.

GSM bugs, essentially striped down, mini cell phones remotely controlled by the eavesdropper, only transmit brief radio handshakes when on standby. In between, there are long periods of radio silence.

Rogue Wi-Fi Access Points (APs) pose a similar detection challenge.

Murray Associates researched and developed a custom solution, Digital Surveillance Location Analysis™. It is especially effective for inspecting aircraft

and automobiles.

Wireless LAN Security Audits with Compliance Reporting™

A Murray Associates Independent Wireless LAN (WLAN) Audit inexpensively helps guard against eavesdropping, data disasters and government penalties. It is part of our TSCM service, but may be ordered separately when compliance is the main issue.

• Audits are unobtrusive.

• Audits are inexpensive.

• Audit scheduling is easy.

​ Just one loophole...

Hackers are in.

Data is out.

&

"You are out of compliance."

Some of the privacy laws and directives which may impact your Wi-Fi usage.

• Sarbanes-Oxley Act – U.S. Public Companies

• HIPAA – Health Insurance Portability and Accountability Act

• GLBA – Gramm-Leach-Bliley Financial Services Modernization Act

• PCI-DSS – Payment Card Industry Data Security Standard

• FISMA – Federal Information Security Management Act

• DoD 8100.2 – Use of Commercial Wireless Devices, Services,

and Technologies in the Department of Defense Global Information Grid

• ISO 27001 – Information Security Management

• Basel II Accord – Banking

• EU - CRD (Cad 3) – EU - Capital Requirements Directive - Banking

Communications Systems Analysis

We use specialized communications inspection instrumentation - capable of testing all types of business digital, VoIP and POTS telephone systems.

We believe you should also understand our procedures and instrumentation. Our friendly technical investigators invite you to ask questions and watch them as they work. Once an area is cleared, they will show you the instrumentation and clearly explain their search procedures.

In addition to electronic eavesdropping, they consider all espionage methods. Advanced Murray Associates TSCM methodology is more than just a debugging sweep.

Our technicians care about your case; they:

• find answers;

• develop practical, cost-effective solutions;

• and resolves your concerns.

They are also genuinely nice people.

Know who you are trusting.

We have put years into earning your trust today.

Others may try to do the same with a few minutes of fast talk.

Please compare.

• Are Business Espionage Security Surveys the company’s only business?

• How many years have they been in practice?

• How many years under their current company name?

• How many debugging sweeps have they conducted?

• Are their recommendations independent and unbiased?

(If they profit from their recommendations in any way, their answer is no.)

• Can you obtain copies of their Certificates of Insurance?

• Are their "technical specialists" full-time, and on the books?

• Are resumes available for every employee who will be on your premises?

• Do they have extensive security and investigatory experience?

• Is the principal professionally certified (CPP, CISM, CFE, etc.)?

• Are the certifications real and current?

• Have they taught Counterespionage on a university level?

• Can you obtain meaningful references – in your industry, in your area?

• Are they certified as independent consultants? (members of IAPSC.org)

• Will they allow their findings to be verified via polygraph testing?

• Are they qualified to assist you with other security matters, too?

• Will their “expert witness” status stand up under courtroom scrutiny?

Check for proper instrumentation and the latest procedures.

• Do they own their own equipment? (Or is it borrowed from their day job.)

• Did they purchase their equipment new? (Not old ebay, used, or surplus.)

• Is the majority of their instruments laboratory or government versions?

• Do they use Radio-Reconnaissance Spectrum Analysis?

• Do they use Non Linear Junction Detection (NLJD)?

• Do they use Frequency Domain Reflectometry to check wiring?

• Can their instrumentation NLJD test your phone lines?

• Will their instrumentation decode digital and VoIP phones?

• Is Wi-Fi security & compliance included in the inspection process?

• Is Thermal Imaging Spectrum Analysis® part of the inspection?

• Can they detect GSM bugs?

• Do they inspect for infrared emissions, fiber optic devices, etc.?

• Do they custom tailor their methodology based on your needs?

And most importantly...

• Are they sincerely interested in solving your problem?

• Are they really capable of solving your problem?

US

YES

40+

35+

4000+

YES

YES

YES

YES

YES

YES

YES

YES

YES

YES

YES

YES

YES

YES

YES

YES

YES

YES

YES

YES

YES

YES

YES

YES

YES

YES

YES

YES

THEM

?

?

?

?

?

?

?

?

?

?

?

?

?

?

?

?

?

?

?

?

?

?

?

?

?

?

?

?

?

?

?

?

Murray Associates is an independent security consulting firm which limits its services to the: prevention of unauthorized, unlawful electronic surveillance; protection of privacy; and the prevention of information theft. Assignments are conducted on a fixed-fee basis.

"Our privacy can be invaded, and our conversations bugged, in unexpected ways, in unlikely places, by people we least suspect. There are a number of devices you can buy that say they can detect bugs, and we bought them, and tried them, and they didn't work.

We hired a private detective. (Murray Associates) We found: he could find bugs - the equipment we tried didn't."

Segment: "Is Someone Listening?"

John Stossel, with Hugh Downs

Sole Technical Consultant: Kevin D. Murray

Fortune

"Unless you've done a thorough electronic sweep recently, assume anything you communicate by telex, electronic mail, fax, or phone is up for grabs."

Article: "CORPORATE SPIES SNOOP TO CONQUER"

By: Brian Dumaine

Business Finance

"What is being reported in the business press," Murray notes, "are only the espionage attempts that have failed. That's probably a very small percentage of what is actually taking place." One study presented to Congress last year found that American companies lose $250 billion each year because competitors get hold of key business information."

Article: Spotting Corporate Spies

By: Eric Krell

Security

"Proper spy busting instrumentation is important, but a successful sweep ultimately depends on the technician's knowledge. For example, if a technician doesn't know fiber optic microphones exist - it may look like fishing line stitched into a carpet or drape - it will be overlooked. The espionage world is full of these surprises.'"

"When a company gets hit by a spy, it's like it suddenly has a sexually transmitted disease. Everyone wants something done to prevent it from spreading, but no one wants to talk about it, even though talking about it, sharing the experience, is the only way to make it safer for everyone to do business."

Quoting: Kevin D. Murray

Article: China's Spies Target Corporate America

By: Edward A. Robinson

New Jersey Monthly

"Kevin D. Murray... is one of the world's leading experts in tracing and destroying electronic listening devices. He was the man the Canadian government called in, during the height of a scandal several years ago, when some Members of Parliament charged that the Royal Canadian Mounted Police had bugged their offices.

He found that the office of one M.P. had indeed been bugged, but the bug had been planted by a Canadian detective agency which previously had been contracted to sweep the premises. Murray's counterespionage services are most often requested, however, by American corporations, many of which are increasingly fearful of being infiltrated by industrial spies."

Article: "Private Eyes"

By: Phillip Longman

SKY Magazine (Delta Airlines)

Protecting phones, faxes, and wires first requires having them examined by an independent eavesdropping detection specialist. This is not a job for a company security director, a private investigator, or security-equipment salespeople calling themselves consultants.

The single bug missed by the person who doesn't know exactly what to look and listen for – a process requiring years of full-time experience – defeats the purpose of any subsequent security measures taken. All that's left is a very dangerous degree of false security.

For the same reasons, you shouldn't do this yourself – nor should you rely on any of the bug-detecting equipment currently on the market. Although some of this equipment is quite good, no single detection device can locate every type of bug that may be in a room, regardless of some manufacturers claims.

...Telephone-Listening Devices: A resistor chip, which is only slightly larger that the eagle's beak on a US quarter, can be installed inside a telephone and pick up all phone, and room, conversations. …one of the nation's top private-sector eavesdropping detection specialists stresses that this is no longer just the dirty work of the professional techno-spy. Murray, who heads the (Oldwick), New Jersey based counterespionage firm of Murray Associates, emphasizes that chips like these "can be purchased by electronic hobbyists at any electronics specialty store for pennies, as can components for more elaborate listening devices."

Article: "Thwarting the Techno-Spy"

By: Marc Tanzer

Media I

Media II

Media III

Kevin D. Murray is the author of textbook chapters, magazine articles, and his own book.

Periodicals: The Legal Investigator, PI Journal (cover story), Full Disclosure, World Association of Detectives News... and many more.

Published I

Published II

Unsolicited compliments, and general comments.

“You exceeded my expectations from my first phone call to the report! Great job.”

V.P. Human Resources, A National Security Company

“As usual, a highly professional job that leaves me with a comfortable feeling about the privacy of our meetings.”

Director, Corporate Security, Health Care Products Manufacturer

“The nature of our business dictated we take necessary security precautions. Little did we know how really unsafe a workplace can be. Murray Assoc’s made (deleted) aware of all aspects of security.”

Vice President - Security, Environmental Remediation Company

“Kevin, I forwarded your name to ____ at ____. Informed him that they should consider using your services rather than retired FBI agents.”

VP - Dir. Corp. Security, Wall Street Area Financial Firm

“This is my 2nd experience using your services. I found your co. prompt and professional. I also appreciated the extra time spent explaining what was being done.”

Vice President - Communications, Financial Services Firm

“Very pleased with the ability to meet our time schedule. Appreciated demonstration of equipment / technology."

Security Director, Technology Services Company

"Overall pleased with service received and confident of findings.”

Security Director, Pharmaceutical Supply Chain Organization

"Kevin and his team are the best at what they do. We were very happy with them."

Chief Technology Officer, Financial Institution

Unsolicited compliments, and general comments.

"The report was extremely well done and, as always, the quality, service and added extras (advice) were superior.”

Director Corporate Affairs, Aviation Industry

"Thank you for explaining how your equipment worked and taking the time to demonstrate. Your written report is very helpful. I almost wish we found a bug -- but now know where to concentrate our efforts, and what to look for.”

DCM, Pharmaceuticals Manufacturer

“Very professional, informative. Report is very usable and easy to understand. Enjoyed meeting “crew”. Do not hesitate to use us for reference.”

Corp. Mg. of Security, “one of the oldest and largest flavour and fragrance houses in the world.”

“By using Murray Associates for counterespionage measures and by making good use of the professional counseling you provided in your report we now have greater confidence in our firm’s security.”

Manager Technology Operations, Financial Investment Firm

“Concise, well written report. One of the most professional companies I have worked with.”

“Your prompt and courteous service was much appreciated! The detailed report will prove to be an excellent resource for our firm. We truly appreciate the quick response to our needs!!”

HR Generalist, Brokerage / Investment Banking Firm

Unsolicited compliments, and general comments.

“As always, Kevin & his team were thorough and professional.”

General Counsel, Hazmat and High-Value Transportation Company

“I have never been more satisfied with a contractor than I am with Murray Associates. They are very professional.”

Corp. VP Security, Agricultural Processor

“Loved the whole approach and low-key attitude conveyed during the evaluation. This went far with explaining things to ‘the boss,’ who was on-hand during the review. The quality of the report is excellent and I love all the references. Great job and keep up the good work.”

Information Services Manager, Communications Tech Corporation

“We are very pleased with the exceptional response time & professionalism displayed by your firm. We will not hesitate to utilize your services in the future. Kevin was fantastic.”

Case Manager, Executive Protection Company

"Thanks for everything Kevin - great working with you and your crew. Good guys."

Security Director, International Luxury Goods Holding Company

"I’d like to take this opportunity to sincerely thank you for all the years of your support to us and me. You and your team are the consummate professionals in the field and you have never once failed to provide the ultimate in service with your inspections, inspection reports and continued updates on the state of the industry. It has been an honor to be associated with you all these years and thanks again for all you’ve done."

Retiring Security Director, Global Military Security and Aeronautics Company

Testimonials I

Testimonials II

Testimonials III

1978 - Murray Associates - the first TSCM firm with a published Operating Policy, and fixed Fee and Expense Schedule. Before this, practitioners either charged using unpredictable hourly fees, or flat-rates based on how much they thought they could charge. Some still do.

1978 - Murray Associates was the first TSCM firm with a polygraph policy. Upon discovery of bugging, wiretapping, or other forms of eavesdropping, clients have always had the right to verify our findings. Back in those days, the “plant a bug, grow more work” mentality was rampant. Our policy successfully countered that. We think there are fewer “planters” in the field these days. However, the policy we started never gained widespread acceptance among our competitors. So, over the years, we became the firm people called for a second opinion.

1980 - The US Government lifted secrecy and sales restrictions on the MicroLab/FXR Non Linear Junction Detector. This unusual instrument detected bugs even if they were “off” or had dead batteries! Very advanced - and expensive - technology. Murray Associates was the first private sector service to purchase one.

1987 - Miniature television cameras with AM micro-transmitters (900 MHz frequency range) became a major threat. Murray Associates was the first countermeasures firm to purchase a spectrum analyzer (Tektronix 2710) capable of receiving and viewing these TV signals.

1988 - Laser beam eavesdropping captures the media’s attention. Our clients became concerned. Murray Associates researched the threat and found much of the information being circulated was either misleading or undocumented. To obtain accurate, first-hand information for our clients, we build a laser beam eavesdropper. Our findings were very informative and put the threat into realistic perspective.

1989 - We established a client feedback system. From this date on, every assignment included a Quality Assurance Report card for the client. Our average Feedback Score is 9.4 out of a possible 10.

1992 - We discover a small company selling 10 GHz transmitter kits for $29. Incredibly, the plans for adding audio capabilities and turning it into a bug cost only $2 more. In 1992, an inspection of radio frequencies above 1.8 GHz was rare. We immediately boosted our audit capabilities to 30+ GHz. Interestingly, many TSCM'ers remain blind in the 10 GHz area to this day!

1997 - Miniature television cameras with FM microtransmitters (2.4 GHz frequency range) become a major threat. Most “countermeasures” equipment couldn’t even see these signals. Some spectrum analyzers could receive the signals, but couldn’t decode them for viewing.

Murray Associates researched and solved the problem. Drawing together various technologies, we created a system that is the next step in the evolution of spectrum analysis... Radio-Reconnaissance Spectrum Analysis™. We now easily receive, view and capture wireless surveillance video signals... and immediately record them for evidentiary purposes.

1999 - New digital telephone systems are vulnerable to digital wiretaps and feature manipulation. Murray Associates develops a FFT technique to help detect these problems.

Also in 1999, Spybusters.com becomes the first Internet site to honor eavesdropping history makers. From inventors to artists to practitioners to law makers - we felt they all played important historical roles. They were not being memorialized anywhere else, so we documented their contributions - pro bono (with the assistance and blessings of family members in many cases).

2000 - We begin experimenting with infrared thermal imaging technology in April, and discovered the new lab-quality imagers can ‘see’ microminiature eavesdropping devices and video cameras hidden in ceiling tiles and behind walls. After a year of research, we purchased a $60,000. thermal imager. The Thermal Emissions Spectrum Analysis™ (TESA™) inspection technique is born. After presenting our findings at the Espionage Research Institute (ERI) annual meeting in Washington, DC, imitators quickly began using inexpensive and eBayed imagers in a effort to appear technically current.

2001 - Wireless Local Area Networks become popular in many corporations and executive homes. So does inserting rogue wireless nodes into supposedly secure hard-wired systems. The threat... wireless wiretapping. Appropriate detection instrumentation is brought on board.

2002 - VoIP telephony becomes the rage. Low cost of calls makes it irresistible to clients. Nobody told them all this comes at a price... easy wiretapping, easy denial of service attacks, and easy theft of services. We were the first in our field to research this communications “advancement,” and provide our clients with a safe migration strategy.

2003 - At our clients' request, Murray Associates established a local presence in the European Union.

2005 - A major technical advancement is made by Sony. They release the first price-practical ($6,000.) UV digital television camera. We experiment with bringing it into it to our field. Evidence of electronic eavesdropping installations are viewed and documented with reflected and absorbed ultra-violet light. R&D benefits our clients... again.

2006 - Continuing research into new sensing instrumentation, we invested approximately $40,000.00 in government-level new NLJD instrumentation for our clients. One of the most exciting capabilities of the new equipment is their ability to "hear" video cameras hidden within objects like clocks, radios, furniture, ceilings, etc.

2007 - We are the first in the private sector to invest ($109,000.00) in a Real-Time Spectrum Analysis with DPX technology for our clients. DPX makes formerly invisible bug signals visible.

2008 - A new Multifunction Digital Telephone Analyzer was released this year. We upgraded our capabilities immediately, at a cost of $19,000.00. Doing so, combined many separate instruments into one unit, thus making room for additional instrumentation in our kit. It also allows detection of digital voice leaks on phone lines; a major accomplishment.

2009 - GSM bugs (tiny eavesdropping devices which can be called via a cell phone) began flooding the Internet 'spy shops' and eBay. Very difficult to locate as they are dormant when not actively being listened to. Sales appear to be brisk, with some models selling for as little as $25.00. Concerned clients asked for a solution. We developed the Digital Surveillance Location Analyzer™ (DSLA™). It pinpoints the location of GSM bugs on a computer map – a first-of-its-kind instrument.

2010 - Spyware on "smart" cell phones hit critical mass this year. Clients and website visitors asked for a solution. What began as an executive briefing turned into a book (complete with customized SpyWarn Mobile™ transmission alert button). IS MY CELL PHONE BUGGED? Everything you need to know to keep your mobile communications private will be released in early 2011.

We also upgraded our travel kit capabilities with the acquisition of a 50 kHz to 24 GHz (in one second!) spectrum analyzer. Unfortunately, after we bought it the U.S. Government thought it was so advanced they put it on their list of items which are not allowed to leave the country. Our U.S. clients will benefit greatly, however.

Development of a Closed Country Protocol – At the request of several clients we researched and developed a viable inspection protocol for conducting business counterespionage audits in China and Singapore. Our initial visits proved that by carefully following the laws and customs of these countries businesses can protect their intellectual property.

2012 - Is My Cell Phone Bugged?: Everything You Need to Know to Keep Your Mobile Conversations Private - becomes an app for Android operating system mobile smartphones. The free version of SpyWarn is available at Google Play.

2013 - With the continued shrinkage in size of electronic components, we noted standard non-linear junction detection was not keeping pace. New technology became available and we were the first to offer its use to the private sector in the U.S.

2014 - SpyWarn™ 2.0 the forensic spyware evaluation app for Android is publicly launched on Google Play. This is quickly followed by the SpyWarn™ Anti-Spyware Kit for Smartphones. This security hardware is exclusively available to Murray Associates clients, free of charge. It is not available elsewhere, at any price.